General

  • Target

    af20d219cb1b2a55aa52637195a6f797f6fb980148735c54e5598c224d32307e

  • Size

    34KB

  • MD5

    67d7c2625c89f6217f7d588c04dca69d

  • SHA1

    c0ca3427565d686cc7d06ef577815dd4bf037eaa

  • SHA256

    af20d219cb1b2a55aa52637195a6f797f6fb980148735c54e5598c224d32307e

  • SHA512

    7ae568bd0350b6fd3e0ec3b6440c3bd4b9f6a45a3fe9160cb5a1c9e0d041c9caf8bb44accc0b69786127936f6380e0fd848f4c2759f1563abd46c038a20c4bfc

  • SSDEEP

    768:XO34EqdUffHhALQU4ug9ZRg0IeP0hVO92tSfJ:XOIEAUffH2B4T9gZo92to

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

0.tcp.eu.ngrok.io:18595

Mutex

919094467c31347c7137dd444837fdc3

Attributes
  • reg_key

    919094467c31347c7137dd444837fdc3

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • af20d219cb1b2a55aa52637195a6f797f6fb980148735c54e5598c224d32307e
    .zip

    Password: infected

  • 5b45188cebe24c4309d3d884cb92bc5d9466e9dd8fa57f670b0008931e18562e.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections